Reverse Engineering

Reverse Engineering-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).

Image View Download All PDFs List View Archive

loading
Semiconductor device having features to prevent reverse engineering
Verisiti, Inc.
April 27, 2017 - N°20170117234

An electronic device includes: a base layer; a first layer located at least partially over the base layer; a second layer located at least partially over the first layer; a first metal layer located at least partially over the second layer, wherein one or more signal outputs of the electronic device are formed in the first metal layer; and a ...
System and method for ip fingerprinting and ip dna analysis
Ipextreme, Inc.
April 13, 2017 - N°20170103079

Embodiments disclosed include computer implemented systems and methods comprising multiple computer programs that when used together as part of the system enable the detection of one set of computer files within another set of files without having direct access to the files themselves. A computer program generated unique fingerprint for each set of files that is a condensed representation of ...
Semiconductor device having features to prevent reverse engineering
Verisiti, Inc.
March 30, 2017 - N°20170092599

It is desirable to design and manufacture electronic chips that are resistant to modern reverse engineering techniques. Disclosed is a method and device that allows for the design of chips that are difficult to reverse engineer using modern teardown techniques. The disclosed device uses devices having the same geometry but different voltage levels to create different logic devices. Alternatively, the ...
Reverse Engineering Patent Pack
Download + patent application PDFs
Reverse Engineering Patent Applications
Download + Reverse Engineering-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Reverse Engineering-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Semiconductor chip with anti-reverse engineering function
International Business Machines Corporation
March 23, 2017 - N°20170084552

A structure and a method. The structure includes a semiconductor substrate; a stack of wiring levels from a first wiring level to a last wiring level, the first wiring level closest to the semiconductor substrate and the last wiring level furthest from the semiconductor substrate, the stack of wiring levels including an intermediate wiring level between the first wiring level ...
Semiconductor device having features to prevent reverse engineering
Verisiti, Inc.
March 02, 2017 - N°20170062425

It is desirable to design and manufacture electronic chips that are resistant to modern reverse engineering techniques. Disclosed is a method and device that allows for the design of chips that are difficult to reverse engineer using modern teardown techniques. The disclosed device uses devices having the same geometry but different voltage levels to create different logic devices. Alternatively, the ...
Anti-reverse engineering unified process
Tectonic Labs, Llc
March 02, 2017 - N°20170061106

Computer-implemented systems, methods, and computer-readable media for generating and executing anti-reverse engineering software include receiving at least one of a set of input instructions and a set of input values; creating a deterministic environment; executing one or more functions corresponding to at least one of the set of input instructions and the set of input values while simultaneously generating a ...
Reverse Engineering Patent Pack
Download + patent application PDFs
Reverse Engineering Patent Applications
Download + Reverse Engineering-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Reverse Engineering-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Systems and methods for authentication based on physically unclonable functions
Maxim Integrated Products, Inc.
January 05, 2017 - N°20170005811

Presented are systems, devices, and methods for reliably authenticating asymmetric cryptography-based ics based on physically unclonable functions (pufs) that are immune to reverse engineering. Various embodiments of the invention enhance the level of security in ic architectures without the need to connect to a remote certification authority, thereby, eliminating shortfalls associated with online authentication. Certain embodiments accomplish this by using ...
Code obfuscation device using indistinguishable identifier conversion and method thereof
Soongsil University Research Consortium Techno-park
December 22, 2016 - N°20160371473

A code obfuscation device and a method of obfuscating a code of an application program file are disclosed. The code obfuscation device includes an extraction circuit uncompressing an application program file to extract a dalvik executable file, a code analysis circuit analyzing a bytecode of the dalvik executable file, a control circuit determining an obfuscation character and a number and ...
Apparatus and method for managing unity file in a mobile platform
Seworks, Inc.
November 17, 2016 - N°20160335422

The present invention relates to managing a unity file in a mobile platform in order to forestall a unity library executable in a mobile platform from being analyzed by reverse engineering and decompiling and provides an apparatus for managing a unity file in a mobile platform comprising a file extracting section that extracts a unity library file from a unity ...
Exploiting the scan test interface for reverse engineering of a vlsi device
Technion Research & Development Foundation Limited
November 10, 2016 - N°20160328509

A computerized method of creating a circuit logic model of a vlsi device, comprising mapping a plurality of logic function patterns of one or more circuits of a vlsi device through a plurality of probe iterations and generating a circuit logic model of the circuit(s) by reconstructing a logical function of a combinatorial logic of the circuit(s) based ...
Automated identification and reverse engineering of malware
Los Alamos National Security, Llc
October 20, 2016 - N°20160306971

An automated malware identification and reverse engineering tool is provided. Subroutine categories may be learned by machine learning. A program may then be reverse-engineered and classified, and subroutines that are potentially indicative of malware may be identified. These subroutines may be reviewed by a reverse engineer to determine whether the program is malware in a more directed and efficient manner.
System, method and computer-accessible medium for security-centric electronic system design
New York University
October 20, 2016 - N°20160306902

An exemplary system, method and computer-accessible medium can be provided which can include, for example, generating a super control dataflow graph(s) (cdfg) by applying a plurality of electronic system level esl design constraints associated with an integrated circuit, determining an upper bound(s) number and a lower bound(s) number based on a number of cdfgs in the super ...
Multi-tiered tamper-resistant assembly system and method
Sensors Unlimited, Inc.
September 08, 2016 - N°20160261812

A multi-tiered approach to combating reverse engineering of electronics is disclosed herein. The encapsulant utilized with the optical sensor may be selected based on being substantially being opaque to x-ray inspection. In this way, visible public inspection to gain competitive intelligence may be reduced and operation of the electronics may remain unaffected. Additionally, a thin filament of wire embedded just ...
Reverse Engineering Patent Pack
Download + patent application PDFs
Reverse Engineering Patent Applications
Download + Reverse Engineering-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Reverse Engineering-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Systems and methods of processing data associated with detection and/or handling of malware
Mcafee Ireland Holdings Limited
July 07, 2016 - N°20160196431

The present disclosure relates to malware and, more particularly, towards systems and methods of processing information associated with detecting and handling malware. According to certain illustrative implementations, methods of processing malware are disclosed. Moreover, such methods may include one or more of unpacking and/or decrypting malware samples, dynamically analyzing the samples, disassembling and/or reverse engineering the samples, performing ...
Secure app update server and secure application programming interface ("api") server
Shape Security, Inc.
June 09, 2016 - N°20160162688

A coupled set of servers in a server system protect an application programming interface (“api”) from unwanted automation facilitated by unauthorized reverse engineering of an endpoint app or communications channel used by the endpoint app. The server system comprises at least one secure app update server that transforms an app code object received from an enterprise ...
Media client device authentication using hardware root of trust
Azuki Systems, Inc.
June 09, 2016 - N°20160162669

A client device for media playback includes a user-installable media client application which implements the client-side of a digital rights management (drm) system. The client device employs secure boot and verifies the user-installed application. The application is hardened against reverse engineering, and it utilizes a special api provided by the client device to tie into the secure boot, bridging the ...
Apparatus and method for managing apk file in an android platform
Seworks, Inc.
May 12, 2016 - N°20160132547

The present invention relates to an apparatus for managing an apk file in the android platform in order to forestall an executable file in an apk file from being analyzed by reverse engineering or decompiling that comprises a file reader that reads an original . Dex file in the apk file, a file modifier that modifies the original . Dex file the ...
Visual tool for reverse engineering software components
General Motors Llc
May 12, 2016 - N°20160132327

A system and method of displaying a software application using a software architecture tool that includes: receiving a portion of an existing software application at the software architecture tool; identifying one or more software components of the existing software application from the received portion; automatically identifying a tier and layer location for each standard software component; and presenting one or ...
Systems and methods for enhancing confidentiality via logic gate encryption
Maxim Integrated Products, Inc.
April 07, 2016 - N°20160099714

Presented are systems and methods that allow hardware designers to protect valuable ip and information in the hardware domain in order to increase overall system security. In various embodiments of the invention this is accomplished by configuring logic gates of existing logic circuitry based on a key input. In certain embodiments, a logic function provides results that are dependent not ...
Semiconductor device having features to prevent reverse engineering
Secure Silicon Layer, Inc.
April 07, 2016 - N°20160099219

It is desirable to design and manufacture electronic chips that are resistant to modern reverse engineering techniques. Disclosed is a method and device that allows for the design of chips that are difficult to reverse engineer using modern teardown techniques. The disclosed device uses devices having the same geometry but different voltage levels to create different logic devices. Alternatively, the ...
Fine-grained address space layout randomization
Apple Inc.
March 31, 2016 - N°20160092675

A data processing system can use a method of fine-grained address space layout randomization to mitigate the system's vulnerability to return oriented programming security exploits. The randomization can occur at the sub-segment level by randomizing clumps of virtual memory pages. The randomized virtual memory can be presented to processes executing on the system. The mapping between memory spaces can be ...